Information Technology Reference
In-Depth Information
Preuß, S. and C. H. Cap (2000). Overview of
Spontaneous Networking - Evolving Concepts
and Technologies. Rostocker Informatik-Berichte,
Fachbereich Informatik der Universit{\”a}t Ros-
tock. 24: 113-123.
Zhu, F., & Mutka, M. (2005). Service Discovery
in Pervasive Computing Environments. IEEE
Pervasive Computing / IEEE Computer Society
[and] IEEE Communications Society , 4 (4), 81-90.
doi:10.1109/MPRV.2005.87
Ratsimor, O., Chakraborty, D., Joshi, A., & Finin,
T. (2002). Allia: alliance-based service discovery
for ad-hoc environments. Paper presented at the
Proceedings of the 2nd international workshop on
Mobile commerce Atlanta, Georgia, USA.
Zhu, F., Mutka, M., & Ni, L. (2003, March 23-26,
2003). Splendor: A Secure, Private, and Location-
aware Service Discovery Protocol Supporting
Mobile Services. Paper presented at the 1st IEEE
Annual Conference on Pervasive Computing and
Communications, Fort Worth, Texas.
Ratsimor, O., Korolev, V., et al. (2001). Agents-
2Go: An Infrastructure for Location-Dependent
Service Discovery in The Mobile Electronic
Commerce Environment. First ACM Mobile
Commerce Workshop, Rome.
Zhu, F., Mutka, M., & Ni, L. (2005). Facilitating
secure ad hoc service discovery in public environ-
ments. Journal of Systems and Software , 76 (1),
45-54. doi:10.1016/j.jss.2004.07.014
Richard, G. G. III. (2000). Service Advertisement
and Discovery: Enabling Universal Device Coop-
eration. IEEE Internet Computing , (September-
October): 18-26. doi:10.1109/4236.877482
Zhu, F., Mutka, M., & Ni, L. (2006). A Private,
Secure and User-centric Information Exposure
Model for Service Discovery Protocols. IEEE
Transactions on Mobile Computing , 5 (4), 418-
429. doi:10.1109/TMC.2006.1599409
Salutation Consortium. (1999). Salutation Archi-
tecture Specification (Version 2.0c ed.).
Zhu, F., Zhu, W., et al. (2005). Expose or Not? A
Progressive Exposure Approach for Service Dis-
covery in Pervasive Computing Environments. 3rd
IEEE Annual Conference on Pervasive Comput-
ing and Communications, Kauai island, Hawaii.
Sun Microsystems. (2001). Jini™Technology
Core Platform Specification (Version 1.2 ed.):
Sun Microsystem. Retrieved from http://wwws.
sun.com/ software/jini/specs/.
Zhu, F., Zhu, W., Mutka, M., & Ni, L. (2007). Pri-
vate and Secure Service Discovery via Progressive
and Probabilistic Exposure. IEEE Transactions
on Parallel and Distributed Systems , 18 (11),
1565-1577. doi:10.1109/TPDS.2007.1075
Varshavsky, A., Reid, B., & Lara, E. d. (2005). A
Cross-Layer Approach to Service Discovery and
Selection in MANETs. Paper presented at the 2nd
International Conference on Mobile Ad-Hoc and
Sensor Systems (MASS), Washington, DC.
Ververidis, C., & Polyzos, G. (2008). Service
Discovery for Mobile Ad Hoc Networks: a
Survey of Issues and Techniques. IEEE Com-
munications Surveys , 10 (3), 30-45. doi:10.1109/
COMST.2008.4625803
KEY TERMS AND DEFINITIONS
Application Layer Service Discovery: Usu-
ally, service discovery protocols are implemented
at the application layer. Thus, they are independent
of the underlying media, lower layer network
protocols, and operating systems.
Cross-Layer Optimization: Cross-layer op-
timization is sometimes used in service discovery
Zhu, F., Mutka, M., et al. (2004). PrudentExposure:
A Private and User-centric Service Discovery
Protocol. 2nd IEEE Annual Conference on Perva-
sive Computing and Communications, Orlando,
Florida, IEEE Computer Society Press.
Search WWH ::




Custom Search